Analysis
-
max time kernel
2s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 07:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0ebb1f77b0e90440495937b617d5daf3.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0ebb1f77b0e90440495937b617d5daf3.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
0ebb1f77b0e90440495937b617d5daf3.exe
-
Size
899KB
-
MD5
0ebb1f77b0e90440495937b617d5daf3
-
SHA1
e0c8fbbb5384b0d8eece93b65cba88ccc7fb84a9
-
SHA256
13724c11dd3b0c7c1c86b09467db1b0b45c96a06e8dbf89d93274bb274d9c736
-
SHA512
b9846b71a0a41b4538ce3a503a5e797efca7bbc23d7b5ac36a397f4e1e671ea39791303ee777b564f14a9e3ea549a843fa4d35c128f217e2265c00723079abe6
-
SSDEEP
24576:VxGaeDp3kdGp9kyPVzECqCYRK+ILTfBLXSYo:Oak9P7+CK
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4060 0ebb1f77b0e90440495937b617d5daf3.tmp -
Loads dropped DLL 8 IoCs
pid Process 4060 0ebb1f77b0e90440495937b617d5daf3.tmp 4060 0ebb1f77b0e90440495937b617d5daf3.tmp 4060 0ebb1f77b0e90440495937b617d5daf3.tmp 4060 0ebb1f77b0e90440495937b617d5daf3.tmp 4060 0ebb1f77b0e90440495937b617d5daf3.tmp 4060 0ebb1f77b0e90440495937b617d5daf3.tmp 4060 0ebb1f77b0e90440495937b617d5daf3.tmp 4060 0ebb1f77b0e90440495937b617d5daf3.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3744 wrote to memory of 4060 3744 0ebb1f77b0e90440495937b617d5daf3.exe 21 PID 3744 wrote to memory of 4060 3744 0ebb1f77b0e90440495937b617d5daf3.exe 21 PID 3744 wrote to memory of 4060 3744 0ebb1f77b0e90440495937b617d5daf3.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ebb1f77b0e90440495937b617d5daf3.exe"C:\Users\Admin\AppData\Local\Temp\0ebb1f77b0e90440495937b617d5daf3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\is-GUFEF.tmp\0ebb1f77b0e90440495937b617d5daf3.tmp"C:\Users\Admin\AppData\Local\Temp\is-GUFEF.tmp\0ebb1f77b0e90440495937b617d5daf3.tmp" /SL5="$5006C,500148,146432,C:\Users\Admin\AppData\Local\Temp\0ebb1f77b0e90440495937b617d5daf3.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4060
-